Recognition (BlackBox) – part 1

A different approach to traditional recognition. When a vulnerability search is carried out for a company, and not enough information is provided, it is difficult to have a map about all the assets that correspond to the company. In this entry you can obtain information on different techniques to locate those targets that are not visible

Read More